Windows
Analysis Report
BXOZIGZEUa.exe
Overview
General Information
Sample name: | BXOZIGZEUa.exerenamed because original name is a hash value |
Original sample name: | 8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8.exe |
Analysis ID: | 1585133 |
MD5: | fa07873f37b171a5567a9b4b3f2c65eb |
SHA1: | 47d5210522d8c54d3076c1467f2f495025037bb6 |
SHA256: | 8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8 |
Tags: | exeuser-zhuzhu0009 |
Infos: | |
Detection
Score: | 66 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- BXOZIGZEUa.exe (PID: 5612 cmdline:
"C:\Users\ user\Deskt op\BXOZIGZ EUa.exe" MD5: FA07873F37B171A5567A9B4B3F2C65EB) - conhost.exe (PID: 4320 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - JdEV.exe (PID: 3524 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\JdEV.ex e MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96) - WerFault.exe (PID: 3608 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 3 524 -s 159 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Bdaejec | Yara detected Bdaejec | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T06:07:58.585996+0100 | 2807908 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 44.221.84.105 | 799 | TCP |
2025-01-07T06:08:02.958493+0100 | 2807908 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 44.221.84.105 | 799 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T06:07:57.948894+0100 | 2838522 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 56399 | 1.1.1.1 | 53 | UDP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Spreading |
---|
Source: | System file written: | Jump to behavior | ||
Source: | System file written: | Jump to behavior | ||
Source: | System file written: | Jump to behavior |
Source: | Code function: | 0_2_004DB7F2 | |
Source: | Code function: | 0_2_004DB3FE | |
Source: | Code function: | 0_2_004ED5ED | |
Source: | Code function: | 2_2_00D129E2 |
Source: | Code function: | 2_2_00D12B8C |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 2_2_00D11099 |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00520549 |
Source: | Binary or memory string: | memstr_a1dea10d-2 |
Source: | Code function: | 0_2_005220D5 | |
Source: | Code function: | 0_2_0055C7D7 | |
Source: | Code function: | 0_2_0051A90D | |
Source: | Code function: | 0_2_004F4F49 | |
Source: | Code function: | 0_2_004F3094 | |
Source: | Code function: | 0_2_0055F4A8 | |
Source: | Code function: | 0_2_0051794D | |
Source: | Code function: | 0_2_0055BC41 | |
Source: | Code function: | 0_2_0052FE15 |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_005D0170 | |
Source: | Code function: | 0_2_00542118 | |
Source: | Code function: | 0_2_005CE120 | |
Source: | Code function: | 0_2_0056083D | |
Source: | Code function: | 0_2_0051CF37 | |
Source: | Code function: | 0_2_0054107C | |
Source: | Code function: | 0_2_005370B1 | |
Source: | Code function: | 0_2_005DF14C | |
Source: | Code function: | 0_2_005CF9C8 | |
Source: | Code function: | 2_2_00D16076 | |
Source: | Code function: | 2_2_00D16D00 |
Source: | Dropped File: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 2_2_00D1119F |
Source: | Code function: | 0_2_004DD36B |
Source: | Code function: | 0_2_005C86A5 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Code function: | 0_2_005E397D |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_005CEB41 | |
Source: | Code function: | 0_2_005CF1D8 | |
Source: | Code function: | 2_2_00D16425 | |
Source: | Code function: | 2_2_00D1170E | |
Source: | Code function: | 2_2_00D12DAB | |
Source: | Code function: | 2_2_00D1600D |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | System file written: | Jump to behavior | ||
Source: | System file written: | Jump to behavior | ||
Source: | System file written: | Jump to behavior |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Code function: | 0_2_0051814E | |
Source: | Code function: | 0_2_0052A4EB | |
Source: | Code function: | 0_2_00524603 | |
Source: | Code function: | 0_2_004F0624 | |
Source: | Code function: | 0_2_004F06C8 | |
Source: | Code function: | 0_2_00522724 | |
Source: | Code function: | 0_2_005109D9 | |
Source: | Code function: | 0_2_005231B3 | |
Source: | Code function: | 0_2_005231B3 | |
Source: | Code function: | 0_2_005231B3 | |
Source: | Code function: | 0_2_005234B3 | |
Source: | Code function: | 0_2_004FB730 | |
Source: | Code function: | 0_2_00523A3E |
Source: | Code function: | 0_2_004DE757 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Code function: | 0_2_004D2540 |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Evasive API call chain: |
Source: | Evasive API call chain: | graph_0-62961 |
Source: | API coverage: |
Source: | Code function: | 2_2_00D11718 |
Source: | Code function: | 0_2_004DB7F2 | |
Source: | Code function: | 0_2_004DB3FE | |
Source: | Code function: | 0_2_004ED5ED | |
Source: | Code function: | 2_2_00D129E2 |
Source: | Code function: | 2_2_00D12B8C |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-62962 | ||
Source: | API call chain: |
Source: | Code function: | 0_2_005CC787 |
Source: | Code function: | 0_2_005E397D |
Source: | Code function: | 0_2_00676044 |
Source: | Code function: | 0_2_005E9DE5 |
Source: | Code function: | 0_2_005CC787 | |
Source: | Code function: | 0_2_005D3EF0 |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_005E22DF | |
Source: | Code function: | 0_2_005E2767 | |
Source: | Code function: | 0_2_005E27CE | |
Source: | Code function: | 0_2_005E280A | |
Source: | Code function: | 0_2_004D8F07 | |
Source: | Code function: | 0_2_005E5C9F |
Source: | Code function: | 0_2_004D2540 |
Source: | Code function: | 0_2_005D20CC |
Source: | Code function: | 0_2_004DE757 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 3 Native API | 1 DLL Side-Loading | 1 Access Token Manipulation | 11 Masquerading | 31 Input Capture | 11 System Time Discovery | 1 Taint Shared Content | 31 Input Capture | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 2 Process Injection | 1 Access Token Manipulation | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 1 Archive Collected Data | 11 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 2 Process Injection | Security Account Manager | 131 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | 12 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Software Packing | Cached Domain Credentials | 2 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | 23 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
88% | Virustotal | Browse | ||
95% | ReversingLabs | Win32.Virus.Jadtre | ||
100% | Avira | W32/Jadtre.B | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | W32/Jadtre.B | ||
100% | Avira | W32/Jadtre.B | ||
100% | Avira | W32/Jadtre.B | ||
100% | Avira | TR/Dldr.Small.Z.haljq | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
97% | ReversingLabs | Win32.Trojan.Skeeyah |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ddos.dnsnb8.net | 44.221.84.105 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
44.221.84.105 | ddos.dnsnb8.net | United States | 14618 | AMAZON-AESUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585133 |
Start date and time: | 2025-01-07 06:07:03 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 26s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | BXOZIGZEUa.exerenamed because original name is a hash value |
Original Sample Name: | 8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8.exe |
Detection: | MAL |
Classification: | mal66.spre.troj.evad.winEXE@7/16@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.159.64, 13.107.246.45, 172.202.163.200
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
44.221.84.105 | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| |
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ddos.dnsnb8.net | Get hash | malicious | Bdaejec | Browse |
| |
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec, Neshta, Ramnit | Browse |
| ||
Get hash | malicious | Bdaejec, Neshta, Ramnit | Browse |
| ||
Get hash | malicious | Bdaejec, Neshta, Ramnit | Browse |
| ||
Get hash | malicious | Bdaejec, RunningRAT | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-AESUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | KnowBe4 | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\JdEV.exe | Get hash | malicious | Bdaejec | Browse | ||
Get hash | malicious | Bdaejec | Browse | |||
Get hash | malicious | Bdaejec | Browse | |||
Get hash | malicious | Bdaejec | Browse | |||
Get hash | malicious | Bdaejec, Neshta, Ramnit | Browse | |||
Get hash | malicious | Bdaejec, Neshta, Ramnit | Browse | |||
Get hash | malicious | Bdaejec, Neshta, Ramnit | Browse | |||
Get hash | malicious | Bdaejec, RunningRAT | Browse | |||
Get hash | malicious | Bdaejec | Browse |
Process: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19456 |
Entropy (8bit): | 6.59136493937655 |
Encrypted: | false |
SSDEEP: | 384:1FmUScXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:et8QGPL4vzZq2o9W7GsxBbPr |
MD5: | 138DE96CAE0ECE4D36CCCCFF751E1477 |
SHA1: | 8CE79EF5C3FBE2932BA5CEE7202BAF19133F14D1 |
SHA-256: | 52DA201660D7B4402F0DFD5EC54EAF625DFCEB30E631E46EB5A3988C67552A97 |
SHA-512: | E0AC3E19202A9D7BDF46F27ADE5CB096FA94080CC0954D283C23E5EE815E5AF9B1DA9C6EE19CCBA15B86B4726A984BFA815081CAE3547C6CAB02B464FC85C3B6 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2389504 |
Entropy (8bit): | 6.731345473641953 |
Encrypted: | false |
SSDEEP: | 49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf |
MD5: | 2F365839E9C8B28750D07CCB95B8F008 |
SHA1: | B1454610D0F57E6000B3D7DA61A2224EFBB9E85C |
SHA-256: | 1B7D0B3B2E03FC422B07F1A86811F9A081668CACB0EB7915F1FC889A7E623E7D |
SHA-512: | 568D1D520C99628FB7BD7E0E049CD15884FC8BAB1E8F52DA37E6BBD19CC46C61AAED5C22182177B6251C983E542100A5B10A51AE5E20A022B49C550F415CE2C5 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 31744 |
Entropy (8bit): | 6.365985714863891 |
Encrypted: | false |
SSDEEP: | 768:uWQ3655Kv1X/qY1MSdtBQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdtmGCq2iW7z |
MD5: | CF99C490ECEBC6F3099ED146E75BAD7B |
SHA1: | 4C00D073CEA301532F5A16660FB623F707EF348A |
SHA-256: | A39E02A55C414CA2A62C79BA1C98C6D6DC4565829F814EE539F2245FBBCD389F |
SHA-512: | 7D30B77876722CFBEB08D36E6DA98258C881C255BB043B38135F6923320702E477903FF0CD266762F105D546D2A12A4098957572ABBBAD4B2B4E858945662329 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_JdEV.exe_cd8f4618334c72b9a4dd6cfe872fc24dcdd0ad_684e5ed5_2c465ccf-9f0d-4490-93df-6e7ad4546399\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9841334238155683 |
Encrypted: | false |
SSDEEP: | 192:rKvwxvN6UI0fyRmgSv3j0/J9zuiFckZ24IO8eOB6:riwxvN6Ujf8mRv3jAzuiFckY4IO8eOB |
MD5: | 4368566DFAE0E3B90D5545AC2D87F299 |
SHA1: | 270E2D6B16E443A25D4D8E911DC1F4F035CBC4DF |
SHA-256: | 03008AA5CFEFD619F1902A0078D6C747FE5376F4162C808AC66D12D844BC3819 |
SHA-512: | 1946044DA8849E45CAC95D12040A21CAAF929A1AC366E89C4A489296CD261073FBD34E460D405DD112D7469453677118E03640ACB1F24BC7812480E8F5AA6BF1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 160940 |
Entropy (8bit): | 1.8609507336429265 |
Encrypted: | false |
SSDEEP: | 384:QH+EYiFNdD7gx9HAb7GUqpDGKiVuGppZLuNeBGzkzWoprbIn:QH+EP6x9HAXGjDG+ALuFoc |
MD5: | A0A146F2A4FDBA14C0C193918E076757 |
SHA1: | 474C9CE26319DEA66859F2A629D427DE51CD7F9D |
SHA-256: | 088B495515746B166078A3C8CB5E43E94C82BEC8E4F260F1B1FD1DA623EFA869 |
SHA-512: | 741306A252611B6969F0C8571787D23AA12D1A5BF1E3DA5EF25F3C99AE8371746973C67DC2897C6B91062187217617590F20BC2A95C3DE77CD0B372A8357E225 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6256 |
Entropy (8bit): | 3.719234995987262 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJRCv6+BqeYwwWuqdpDH89bH8sfONm:R6lXJRK6+VYwwWaHPfV |
MD5: | 425D1D7CDF809E2FE7CCBFA91D487754 |
SHA1: | 784C943F63798BCEE7C6463B1C2DD1C3855B7B37 |
SHA-256: | E7C3480CEF95833F08FAF41E115FB67A5D1AFAE9B4F4166F404D25390E120AC7 |
SHA-512: | 4A178DE691E52C9AA4452CFF3844BC893CBAF5F077D9F53D3B3382E48917ACFB26D1C83DAD0CAB327F71078C7E3A5F86A0D35564EFD160236BC365458C1F1FC7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4537 |
Entropy (8bit): | 4.436549818226328 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsPeJg77aI97QWpW8VYcYm8M4JwGFc+q8m5U0zgqAd:uIjfPUI7pp7VUJGxU0zgqAd |
MD5: | F806D7108BB33726E6B799A47809C6CE |
SHA1: | 31BF1FB7156F65BE74AB4BBC7AC6268776AC42BC |
SHA-256: | E9C3580394B73B4F7F36EF6C4486CC42C7B1A32CBD6E2498625B0090C91B9F1D |
SHA-512: | F22C8BE96AD1D7C6DD828A2A676C6E83F6970C6B12211B43207A4B8A047E562E13BB895BCC73F83104567B859AAEC0772F513F064C608075CC3D28089FD42333 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 1.5 |
Encrypted: | false |
SSDEEP: | 3:Nv:9 |
MD5: | D3B07384D113EDEC49EAA6238AD5FF00 |
SHA1: | F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15 |
SHA-256: | B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C |
SHA-512: | 0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 1.5 |
Encrypted: | false |
SSDEEP: | 3:Nv:9 |
MD5: | D3B07384D113EDEC49EAA6238AD5FF00 |
SHA1: | F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15 |
SHA-256: | B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C |
SHA-512: | 0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 1.5 |
Encrypted: | false |
SSDEEP: | 3:Nv:9 |
MD5: | D3B07384D113EDEC49EAA6238AD5FF00 |
SHA1: | F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15 |
SHA-256: | B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C |
SHA-512: | 0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
File Type: | |
Category: | modified |
Size (bytes): | 4 |
Entropy (8bit): | 1.5 |
Encrypted: | false |
SSDEEP: | 3:Nv:9 |
MD5: | D3B07384D113EDEC49EAA6238AD5FF00 |
SHA1: | F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15 |
SHA-256: | B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C |
SHA-512: | 0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BXOZIGZEUa.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15872 |
Entropy (8bit): | 7.031113762428177 |
Encrypted: | false |
SSDEEP: | 384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr |
MD5: | 56B2C3810DBA2E939A8BB9FA36D3CF96 |
SHA1: | 99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC |
SHA-256: | 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07 |
SHA-512: | 27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\Desktop\BXOZIGZEUa.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5884 |
Entropy (8bit): | 3.2100538689449323 |
Encrypted: | false |
SSDEEP: | 96:16T0jnDWLlB9Su3H75DjLocg8IwJR56mXkR/1fszenFWhH:sCyZSuXVDjLor8IwJRMm0wzOEp |
MD5: | 5F167C05E471EB855F876E5F670AA73C |
SHA1: | 88BE1D17384EE549AAE791F326C35F60D194C1A6 |
SHA-256: | 4FAF06C683C2F6680B0B3F73C6A99E3FD84014CC2BD3DB6863F56F288F3FD13F |
SHA-512: | CF8CCDCCBF16BF10B91B0DE0076369CA3985EDB1976616F57C82783685AC890C8FA5A388AC2066163B6B9119BA9C0DE4FE6ED39161DF0B3DF06C2555AC9F8076 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BXOZIGZEUa.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5740 |
Entropy (8bit): | 3.173847699149194 |
Encrypted: | false |
SSDEEP: | 96:EHv3dP0/4NiuIR0ONNjnuUw8u5pF6KXkRQ1fsCncekSDzD:E1viuCVDjuT8u5p4K05CcWDzD |
MD5: | 3821A155A04A6A2E4811B60BEE95BA38 |
SHA1: | 76E66DB688BD24BC907D7EF90A951D4CD74FB710 |
SHA-256: | 6931E4EA0B4B6C80DA549F8EAA738639FBC03590B0429C773C5E6D75085E80D4 |
SHA-512: | DF33A4829683F534C505FADC7BE5BB2899614A42FE85446ABA8593D4C13D065C25871557563F9F3D7F1BAEA4927788B184573B9A8CC4C248BA873AEB8D0E1B18 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BXOZIGZEUa.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6284 |
Entropy (8bit): | 3.210060094944142 |
Encrypted: | false |
SSDEEP: | 96:f4rgQY2e/NI0IXSu6o4zvM181fQ1UvZUuQSCUJ:b2e/BfosxZUK/ |
MD5: | 37B7D5A41FF318D021B72C680E68CC3B |
SHA1: | 69977EC82CFD33B3A06BA4DD06553CE6E8FDD256 |
SHA-256: | 81E03C26AA1707F2019E050037D31F89B80F808CE9F4C5CE804FC43BE1E22355 |
SHA-512: | F112FF23C1542737CB3A519C862F9A746F7922BD0983B942A03099942D23C8AD219B02A2ACD6F4C2E442E8A23009C0E460238A69DE7331FD1A071FC4E78353C3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.422036462537943 |
Encrypted: | false |
SSDEEP: | 6144:CSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNy0uhiTw:RvloTMW+EZMM6DFyo03w |
MD5: | 80B89F8FCF476C2A28F60EE858390297 |
SHA1: | A410BB54B91DCBAFD6ECCD716C99D6A2EF07BBE3 |
SHA-256: | 84B92EFB5396866E980B218C3C815A344CC091463AAEC4F2E7402C44A9F87FC2 |
SHA-512: | 4C991D31CF6C323492EB4FD1303AEE69CD1210F7551982C66D9CE9099223EC3B134933A0DAB62A3419FD74D50DE92A62D6A0652052DDC03A13BADB608FD51834 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.426054235926492 |
TrID: |
|
File name: | BXOZIGZEUa.exe |
File size: | 1'700'352 bytes |
MD5: | fa07873f37b171a5567a9b4b3f2c65eb |
SHA1: | 47d5210522d8c54d3076c1467f2f495025037bb6 |
SHA256: | 8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8 |
SHA512: | 68a8f289ea6acdd7b79595cd8f7cde9ff468f2e26b56e1b7cef024b8a999f834a94e43c165a5a9b0c4b42008afb7b9446b29aa2019c68133d65409d631c19f29 |
SSDEEP: | 49152:XE4XbjEKOh3SbiwJjn7gu5LUvdW9apuLvht/cionurM0EIMa1:Xrj834iwJjn7gu5LmMapuNiiMurM0 |
TLSH: | 96759D3136908077C67B32319B9AA3FDB6F9A5304D35524B56A10E3C2E709D3A92C76F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7Nd.s/..s/..s/..zW..r/..zW.../..h..._/..h..../..h.......zW..V/..s/...-..h...q/..h...r/..h...r/..Richs/..........PE..L.....q]... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x5a6000 |
Entrypoint Section: | uY |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5D71F817 [Fri Sep 6 06:09:27 2019 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 6f75980df73bd959bec9fcfb664cfd02 |
Instruction |
---|
push ebp |
mov ebp, esp |
sub esp, 0000016Ch |
xor eax, eax |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-24h], eax |
mov dword ptr [ebp-10h], eax |
mov dword ptr [ebp-14h], eax |
mov dword ptr [ebp-08h], eax |
mov dword ptr [ebp-0Ch], eax |
mov dword ptr [ebp-20h], eax |
mov dword ptr [ebp-18h], eax |
mov dword ptr [ebp-48h], 5645644Ah |
mov dword ptr [ebp-44h], 6578652Eh |
mov dword ptr [ebp-40h], 00000000h |
mov dword ptr [ebp-3Ch], 00000000h |
call 00007FF040E682F5h |
pop eax |
add eax, 00000225h |
mov dword ptr [ebp-04h], eax |
mov eax, dword ptr fs:[00000030h] |
mov dword ptr [ebp-28h], eax |
mov eax, dword ptr [ebp-04h] |
mov dword ptr [eax], E904C483h |
mov eax, dword ptr [ebp-04h] |
mov dword ptr [eax+04h], FFF58236h |
mov eax, dword ptr [ebp-28h] |
mov eax, dword ptr [eax+0Ch] |
mov eax, dword ptr [eax+1Ch] |
mov eax, dword ptr [eax] |
mov eax, dword ptr [eax+08h] |
mov ecx, dword ptr [eax+3Ch] |
mov ecx, dword ptr [ecx+eax+78h] |
add ecx, eax |
mov edi, dword ptr [ecx+1Ch] |
mov ebx, dword ptr [ecx+20h] |
mov esi, dword ptr [ecx+24h] |
mov ecx, dword ptr [ecx+18h] |
add esi, eax |
add edi, eax |
add ebx, eax |
xor edx, edx |
mov dword ptr [ebp-30h], esi |
mov dword ptr [ebp-1Ch], edx |
mov dword ptr [ebp-34h], ecx |
cmp edx, dword ptr [ebp-34h] |
jnc 00007FF040E6843Eh |
movzx ecx, word ptr [esi+edx*2] |
mov edx, dword ptr [ebx+edx*4] |
mov esi, dword ptr [edi+ecx*4] |
add edx, eax |
mov ecx, dword ptr [edx] |
add esi, eax |
cmp ecx, 4D746547h |
jne 00007FF040E68344h |
cmp dword ptr [edx+04h], 6C75646Fh |
jne 00007FF040E6833Bh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x169250 | 0x168 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x17b000 | 0x6d8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x17c000 | 0x1a450 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x128d40 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x152ba0 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x128000 | 0x934 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1268a3 | 0x126a00 | f488be5fc3a676598f8a364845853fad | False | 0.5610067750318201 | data | 6.539294700431528 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x128000 | 0x444ba | 0x44600 | e3d187bee7a20b52c8a5aa950dc5959c | False | 0.27052745086837293 | data | 5.047397246056738 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x16d000 | 0xdb04 | 0x6000 | 2f590fbdc2c5ab2e1fce65b7a0243ebb | False | 0.2849934895833333 | data | 4.7641816505688 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x17b000 | 0x6d8 | 0x800 | 18b01f74d64d681072db0f41366c4eb8 | False | 0.353515625 | data | 4.6625627260129 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x17c000 | 0x293f4 | 0x29400 | 3edbefab711cfe5d831cbd18bbf4c4bd | False | 0.26879142992424243 | data | 4.982795266679088 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
uY | 0x1a6000 | 0x5000 | 0x4200 | 0cbe2dac05299bb6514c66d11d100775 | False | 0.7771070075757576 | data | 6.933836062310107 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_STRING | 0x17b0e8 | 0x3e | data | English | United States | 0.6612903225806451 |
RT_VERSION | 0x17b128 | 0x344 | data | Chinese | China | 0.4258373205741627 |
RT_MANIFEST | 0x17b46c | 0x26a | ASCII text, with very long lines (618), with no line terminators | English | United States | 0.43042071197411 |
DLL | Import |
---|---|
SETUPAPI.dll | SetupGetStringFieldW, SetupDiDestroyDeviceInfoList, SetupDiCallClassInstaller, SetupDiGetDeviceRegistryPropertyW, SetupDiEnumDeviceInfo, SetupDiGetClassDevsW, SetupFindNextLine, SetupCloseInfFile, SetupFindFirstLineW, SetupOpenInfFileW, SetupUninstallOEMInfW |
KERNEL32.dll | IsProcessorFeaturePresent, HeapCreate, FreeEnvironmentStringsW, IsValidCodePage, QueryPerformanceCounter, GetStringTypeW, GetTimeZoneInformation, GetConsoleMode, EnumSystemLocalesA, IsValidLocale, WriteConsoleW, GetDriveTypeW, SetEnvironmentVariableA, CreateFileA, GetConsoleCP, GetLocaleInfoA, LCMapStringW, GetOEMCP, GetACP, GetCPInfo, GetStartupInfoW, GetStdHandle, SetHandleCount, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetFileType, GetProcessHeap, SetStdHandle, VirtualQuery, GetSystemInfo, VirtualAlloc, GetSystemTimeAsFileTime, HeapSize, HeapQueryInformation, CreateThread, ExitThread, HeapReAlloc, RaiseException, ExitProcess, RtlUnwind, HeapAlloc, HeapSetInformation, HeapFree, DecodePointer, EncodePointer, FindResourceExW, GetUserDefaultLCID, VirtualProtect, GetNumberFormatW, SearchPathW, Sleep, GetProfileIntW, GetTickCount, GetFileTime, GetFileSizeEx, GetFileAttributesExW, GetTempPathW, GetTempFileNameW, GetFullPathNameW, GetVolumeInformationW, GetCurrentProcess, DuplicateHandle, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, CreateFileW, lstrcmpiW, FreeResource, GlobalFindAtomW, InitializeCriticalSectionAndSpinCount, lstrlenA, GlobalGetAtomNameW, GetCurrentProcessId, GlobalAddAtomW, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileIntW, InterlockedIncrement, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, CompareStringW, GlobalFlags, InterlockedDecrement, ReleaseActCtx, CreateActCtxW, GetVersionExW, lstrcpyW, GetSystemDirectoryW, GetCurrentDirectoryW, WaitForSingleObject, ResumeThread, SetThreadPriority, CloseHandle, FileTimeToLocalFileTime, FileTimeToSystemTime, FindFirstFileW, FindNextFileW, FindClose, GlobalFree, CopyFileW, GlobalSize, GlobalUnlock, FormatMessageW, MulDiv, SetErrorMode, lstrcmpA, GlobalDeleteAtom, GetCurrentThread, GetCurrentThreadId, GetModuleFileNameW, GetUserDefaultUILanguage, ConvertDefaultLocale, GetSystemDefaultUILanguage, ActivateActCtx, LoadLibraryW, DeactivateActCtx, SetLastError, MultiByteToWideChar, GlobalLock, lstrcmpW, GlobalAlloc, GetProcAddress, FreeLibrary, GetLocaleInfoW, LoadLibraryExW, InterlockedExchange, LocalAlloc, LocalFree, SetFileAttributesW, GetFileAttributesW, DeleteFileW, WideCharToMultiByte, lstrlenW, GetLastError, GetWindowsDirectoryW, FindResourceW, LoadResource, LockResource, SizeofResource, GetModuleHandleW, GetCommandLineW, GetEnvironmentStringsW |
USER32.dll | RegisterClipboardFormatW, EmptyClipboard, CloseClipboard, SetClipboardData, OpenClipboard, GetMenuDefaultItem, CreateDialogIndirectParamW, GetNextDlgTabItem, EndDialog, GetUpdateRect, FrameRect, IsClipboardFormatAvailable, SetMenuDefaultItem, WaitMessage, PostThreadMessageW, CreateMenu, IsMenu, UpdateLayeredWindow, EnableScrollBar, UnionRect, MonitorFromPoint, TranslateMDISysAccel, DrawMenuBar, DefMDIChildProcW, DefFrameProcW, UnpackDDElParam, ReuseDDElParam, LoadImageW, InsertMenuItemW, TranslateAcceleratorW, CopyImage, DestroyIcon, LockWindowUpdate, BringWindowToTop, SetCursorPos, SetRect, CreateAcceleratorTableW, LoadAcceleratorsW, GetKeyboardState, GetKeyboardLayout, MapVirtualKeyW, ToUnicodeEx, CopyAcceleratorTableW, DrawFocusRect, DrawFrameControl, DrawEdge, DrawIconEx, DrawStateW, MessageBeep, ReleaseCapture, SetCapture, GetSystemMenu, LoadMenuW, IntersectRect, SetClassLongW, GetAsyncKeyState, NotifyWinEvent, WindowFromPoint, CreatePopupMenu, DestroyAcceleratorTable, SetParent, SetWindowRgn, IsZoomed, IsIconic, OffsetRect, IsRectEmpty, DestroyMenu, GetMenuItemInfoW, InflateRect, CharUpperW, ShowWindow, MoveWindow, IsDialogMessageW, CopyIcon, CheckDlgButton, RegisterWindowMessageW, LoadIconW, SendDlgItemMessageW, SendDlgItemMessageA, WinHelpW, IsChild, GetCapture, GetClassLongW, SetPropW, GetPropW, RemovePropW, IsWindow, SetFocus, GetForegroundWindow, SetActiveWindow, BeginDeferWindowPos, EndDeferWindowPos, GetDlgItem, GetTopWindow, DestroyWindow, GetMessageTime, GetMessagePos, MonitorFromWindow, ScrollWindow, TrackPopupMenu, SetMenu, SetScrollRange, GetScrollRange, SetScrollPos, GetScrollPos, SetForegroundWindow, ShowScrollBar, RedrawWindow, CreateWindowExW, GetClassInfoExW, RegisterClassW, AdjustWindowRectEx, EqualRect, DeferWindowPos, GetScrollInfo, SetScrollInfo, SetWindowPlacement, GetWindowPlacement, CallWindowProcW, GetMenu, SetWindowLongW, SetWindowPos, GetWindowTextLengthW, GetWindowThreadProcessId, GetLastActivePopup, PostQuitMessage, PostMessageW, RemoveMenu, GetSubMenu, GetMenuItemCount, IsWindowEnabled, EnableWindow, MessageBoxW, KillTimer, SetTimer, InvalidateRect, UpdateWindow, GetDesktopWindow, RealChildWindowFromPoint, GetWindow, GetDlgCtrlID, GetWindowRect, GetWindowLongW, GetClassNameW, PtInRect, CharUpperBuffW, GetDoubleClickTime, GetIconInfo, IsCharLowerW, GetKeyNameTextW, MapVirtualKeyExW, SubtractRect, InvertRect, MapDialogRect, HideCaret, GetNextDlgGroupItem, GetWindowTextW, SetWindowTextW, EndPaint, BeginPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, ScreenToClient, GrayStringW, GetWindowRgn, DestroyCursor, DrawIcon, InsertMenuW, GetMenuItemID, AppendMenuW, GetMenuStringW, GetMenuState, ValidateRect, GetCursorPos, PeekMessageW, GetKeyState, SendMessageW, IsWindowVisible, GetActiveWindow, DispatchMessageW, TranslateMessage, GetMessageW, CallNextHookEx, SetWindowsHookExW, CheckMenuItem, EnableMenuItem, ModifyMenuW, GetParent, GetFocus, LoadBitmapW, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, SetCursor, ShowOwnedPopups, DeleteMenu, CopyRect, SetRectEmpty, GetMonitorInfoW, SystemParametersInfoW, EnumDisplayMonitors, GetSystemMetrics, GetSysColor, SetLayeredWindowAttributes, LoadCursorW, GetClientRect, MapWindowPoints, DefWindowProcW, GetClassInfoW, GetSysColorBrush, UnhookWindowsHookEx, FillRect, TabbedTextOutW, DrawTextW, DrawTextExW |
GDI32.dll | GetObjectType, CreateHatchBrush, GetTextExtentPoint32W, CreateDIBSection, CreateRoundRectRgn, CreatePolygonRgn, CombineRgn, GetBkColor, GetTextColor, PatBlt, CreateEllipticRgn, Polyline, Ellipse, Polygon, SetRectRgn, DPtoLP, OffsetRgn, GetRgnBox, SetDIBColorTable, RealizePalette, StretchBlt, SetPixel, SelectPalette, CreatePalette, GetPaletteEntries, GetNearestPaletteIndex, GetSystemPaletteEntries, LPtoDP, GetWindowOrgEx, GetViewportOrgEx, PtInRegion, FillRgn, FrameRgn, GetBoundsRect, ExtFloodFill, SetPaletteEntries, EnumFontFamiliesExW, GetTextFaceW, SetPixelV, SetViewportOrgEx, SelectObject, Escape, DeleteDC, ExtSelectClipRgn, ScaleWindowExtEx, SetWindowExtEx, OffsetWindowOrgEx, SetWindowOrgEx, ScaleViewportExtEx, SetViewportExtEx, CreateCompatibleBitmap, GetObjectW, CreateFontIndirectW, CreatePatternBrush, CreateSolidBrush, CreatePen, GetStockObject, CreateDIBitmap, CreateBitmap, CreateDCW, CopyMetaFileW, Rectangle, GetDeviceCaps, ExtTextOutW, TextOutW, RectVisible, PtVisible, GetPixel, GetWindowExtEx, GetViewportExtEx, CreateRectRgn, SelectClipRgn, SetLayout, GetLayout, SetTextAlign, MoveToEx, LineTo, IntersectClipRect, ExcludeClipRect, GetClipBox, SetMapMode, SetTextColor, SetROP2, SetPolyFillMode, SetBkMode, SetBkColor, RestoreDC, SaveDC, DeleteObject, GetTextCharsetInfo, EnumFontFamiliesW, GetTextMetricsW, BitBlt, CreateCompatibleDC, CreateRectRgnIndirect, OffsetViewportOrgEx |
MSIMG32.dll | TransparentBlt, AlphaBlend |
COMDLG32.dll | GetFileTitleW |
WINSPOOL.DRV | OpenPrinterW, DocumentPropertiesW, ClosePrinter |
ADVAPI32.dll | RegEnumKeyExW, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExW, RegDeleteKeyW, RegSetValueExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegQueryValueW, RegEnumKeyW |
SHELL32.dll | SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, DragFinish, DragQueryFileW, SHAppBarMessage, SHBrowseForFolderW, SHGetSpecialFolderLocation, SHGetDesktopFolder |
COMCTL32.dll | ImageList_GetIconSize |
SHLWAPI.dll | PathStripToRootW, PathIsUNCW, PathRemoveFileSpecW, PathFindFileNameW, PathFindExtensionW |
ole32.dll | CoInitializeEx, DoDragDrop, CreateStreamOnHGlobal, OleLockRunning, IsAccelerator, OleTranslateAccelerator, OleDestroyMenuDescriptor, OleCreateMenuDescriptor, CoUninitialize, CoInitialize, CoCreateInstance, OleDuplicateData, CoTaskMemAlloc, ReleaseStgMedium, RevokeDragDrop, CoLockObjectExternal, RegisterDragDrop, OleGetClipboard, CoTaskMemFree, CoCreateGuid |
OLEAUT32.dll | SysStringLen, VariantClear, VariantChangeType, VariantTimeToSystemTime, SystemTimeToVariantTime, SysAllocStringLen, VarBstrFromDate, VariantInit, SysAllocString, SysFreeString |
gdiplus.dll | GdipGetImageGraphicsContext, GdipBitmapUnlockBits, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipCreateBitmapFromStream, GdipGetImagePalette, GdipGetImagePaletteSize, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipCloneImage, GdipDrawImageRectI, GdipSetInterpolationMode, GdipCreateFromHDC, GdiplusShutdown, GdiplusStartup, GdipCreateBitmapFromHBITMAP, GdipDisposeImage, GdipDeleteGraphics, GdipAlloc, GdipFree, GdipDrawImageI |
OLEACC.dll | AccessibleObjectFromWindow, CreateStdAccessibleObject, LresultFromObject |
IMM32.dll | ImmReleaseContext, ImmGetContext, ImmGetOpenStatus |
WINMM.dll | PlaySoundW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Chinese | China |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T06:07:57.948894+0100 | 2838522 | ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup | 1 | 192.168.2.5 | 56399 | 1.1.1.1 | 53 | UDP |
2025-01-07T06:07:58.585996+0100 | 2807908 | ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin | 1 | 192.168.2.5 | 49704 | 44.221.84.105 | 799 | TCP |
2025-01-07T06:08:02.958493+0100 | 2807908 | ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin | 1 | 192.168.2.5 | 49705 | 44.221.84.105 | 799 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 06:07:58.212992907 CET | 49704 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:07:58.217988968 CET | 799 | 49704 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:07:58.218066931 CET | 49704 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:07:58.218935966 CET | 49704 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:07:58.223764896 CET | 799 | 49704 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:07:58.585882902 CET | 799 | 49704 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:07:58.585895061 CET | 799 | 49704 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:07:58.585995913 CET | 49704 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:07:58.593066931 CET | 49704 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:07:58.599452972 CET | 799 | 49704 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:08:02.567219019 CET | 49705 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:08:02.572099924 CET | 799 | 49705 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:08:02.572249889 CET | 49705 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:08:02.572530985 CET | 49705 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:08:02.577372074 CET | 799 | 49705 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:08:02.958358049 CET | 799 | 49705 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:08:02.958374977 CET | 799 | 49705 | 44.221.84.105 | 192.168.2.5 |
Jan 7, 2025 06:08:02.958492994 CET | 49705 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:08:03.213107109 CET | 49705 | 799 | 192.168.2.5 | 44.221.84.105 |
Jan 7, 2025 06:08:03.218053102 CET | 799 | 49705 | 44.221.84.105 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 06:07:57.948894024 CET | 56399 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 06:07:58.129590034 CET | 53 | 56399 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 7, 2025 06:07:57.948894024 CET | 192.168.2.5 | 1.1.1.1 | 0xe4d2 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 7, 2025 06:07:58.129590034 CET | 1.1.1.1 | 192.168.2.5 | 0xe4d2 | No error (0) | 44.221.84.105 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 44.221.84.105 | 799 | 3524 | C:\Users\user\AppData\Local\Temp\JdEV.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 7, 2025 06:07:58.218935966 CET | 288 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 44.221.84.105 | 799 | 3524 | C:\Users\user\AppData\Local\Temp\JdEV.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 7, 2025 06:08:02.572530985 CET | 288 | OUT |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 00:07:56 |
Start date: | 07/01/2025 |
Path: | C:\Users\user\Desktop\BXOZIGZEUa.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4d0000 |
File size: | 1'700'352 bytes |
MD5 hash: | FA07873F37B171A5567A9B4B3F2C65EB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 00:07:56 |
Start date: | 07/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 00:07:56 |
Start date: | 07/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\JdEV.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd10000 |
File size: | 15'872 bytes |
MD5 hash: | 56B2C3810DBA2E939A8BB9FA36D3CF96 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 00:08:03 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd10000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 2.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 6.8% |
Total number of Nodes: | 1214 |
Total number of Limit Nodes: | 34 |
Graph
Function 004DE757 Relevance: 103.8, APIs: 48, Strings: 11, Instructions: 559libraryloaderstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D2540 Relevance: 42.4, APIs: 19, Strings: 5, Instructions: 445memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00676044 Relevance: 33.4, APIs: 4, Strings: 15, Instructions: 171fileprocessCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DB7F2 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 124filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D1020 Relevance: 97.2, APIs: 31, Strings: 24, Instructions: 952filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00547836 Relevance: 42.4, APIs: 22, Strings: 2, Instructions: 421windowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E1323 Relevance: 16.6, APIs: 11, Instructions: 106memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D1FF0 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 244fileCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00547C0E Relevance: 4.6, APIs: 3, Instructions: 119COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DF2C1 Relevance: 3.1, APIs: 2, Instructions: 68COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DA2C5 Relevance: 3.0, APIs: 2, Instructions: 36COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005CE05B Relevance: 3.0, APIs: 2, Instructions: 32COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D94E4 Relevance: 3.0, APIs: 2, Instructions: 24libraryCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DE70E Relevance: 1.5, APIs: 1, Instructions: 29COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D8780 Relevance: 1.5, APIs: 1, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DAF3A Relevance: 1.5, APIs: 1, Instructions: 27COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DB3BB Relevance: 1.5, APIs: 1, Instructions: 25fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DD0A7 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005CCD12 Relevance: 1.5, APIs: 1, Instructions: 14COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051CF37 Relevance: 53.5, APIs: 28, Strings: 2, Instructions: 1017windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055C7D7 Relevance: 37.1, APIs: 20, Strings: 1, Instructions: 325windowkeyboardCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0056083D Relevance: 24.8, APIs: 13, Strings: 1, Instructions: 340COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005109D9 Relevance: 23.2, APIs: 11, Strings: 2, Instructions: 430windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F4F49 Relevance: 21.3, APIs: 14, Instructions: 280keyboardwindowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F3094 Relevance: 21.3, APIs: 14, Instructions: 268keyboardwindowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005370B1 Relevance: 16.9, APIs: 11, Instructions: 446COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00522724 Relevance: 16.7, APIs: 11, Instructions: 220windowkeyboardCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C86A5 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 109memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00542118 Relevance: 9.4, APIs: 6, Instructions: 383COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00520549 Relevance: 9.0, APIs: 4, Strings: 1, Instructions: 294keyboardCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E22DF Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 54COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D8F07 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 74libraryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DB3FE Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 38libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052A4EB Relevance: 4.5, APIs: 3, Instructions: 43windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00524603 Relevance: 3.1, APIs: 2, Instructions: 57windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051814E Relevance: 3.0, APIs: 2, Instructions: 37windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DD36B Relevance: 3.0, APIs: 2, Instructions: 34comCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F0624 Relevance: 3.0, APIs: 2, Instructions: 31windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F06C8 Relevance: 1.5, APIs: 1, Instructions: 28windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005CE120 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00547335 Relevance: 51.1, APIs: 28, Strings: 1, Instructions: 323fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050A64D Relevance: 49.9, APIs: 33, Instructions: 446COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FACA7 Relevance: 49.5, APIs: 27, Strings: 1, Instructions: 457keyboardCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051F0F4 Relevance: 40.8, APIs: 27, Instructions: 344COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054872F Relevance: 38.8, APIs: 20, Strings: 2, Instructions: 278windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005127AA Relevance: 35.4, APIs: 19, Strings: 1, Instructions: 446windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E8819 Relevance: 31.7, APIs: 17, Strings: 1, Instructions: 191windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005438E6 Relevance: 28.2, APIs: 15, Strings: 1, Instructions: 237windowCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DD54D Relevance: 28.1, APIs: 7, Strings: 9, Instructions: 72libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00563868 Relevance: 26.5, APIs: 14, Strings: 1, Instructions: 206timewindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00563550 Relevance: 23.0, APIs: 12, Strings: 1, Instructions: 257timewindowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D9583 Relevance: 22.9, APIs: 10, Strings: 3, Instructions: 126libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00526A40 Relevance: 22.8, APIs: 15, Instructions: 328COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051EB18 Relevance: 22.7, APIs: 15, Instructions: 232timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053B5C2 Relevance: 19.4, APIs: 10, Strings: 1, Instructions: 190keyboardCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050F1BE Relevance: 17.8, APIs: 9, Strings: 1, Instructions: 286keyboardCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00531057 Relevance: 17.7, APIs: 9, Strings: 1, Instructions: 199windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052018C Relevance: 16.7, APIs: 11, Instructions: 192timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053F436 Relevance: 16.6, APIs: 11, Instructions: 139COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FB305 Relevance: 16.1, APIs: 8, Strings: 1, Instructions: 309timewindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054566E Relevance: 16.0, APIs: 8, Strings: 1, Instructions: 240windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053C01A Relevance: 16.0, APIs: 8, Strings: 1, Instructions: 221timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00584FD2 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 150keyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005405F5 Relevance: 14.2, APIs: 7, Strings: 1, Instructions: 194windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EAEBD Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 69windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F0CBE Relevance: 13.7, APIs: 9, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E14E2 Relevance: 13.6, APIs: 9, Instructions: 96memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005273E0 Relevance: 12.6, APIs: 5, Strings: 2, Instructions: 369windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FC099 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 155windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053135D Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 130windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050851D Relevance: 12.4, APIs: 5, Strings: 2, Instructions: 120fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E4D60 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 117threadwindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00555647 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 78windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B03A0 Relevance: 12.1, APIs: 8, Instructions: 134COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F8497 Relevance: 12.1, APIs: 8, Instructions: 111COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DA380 Relevance: 12.1, APIs: 8, Instructions: 74windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DCD68 Relevance: 12.1, APIs: 8, Instructions: 64COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DA5AE Relevance: 12.1, APIs: 8, Instructions: 52memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E51FD Relevance: 12.0, APIs: 8, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B4D84 Relevance: 12.0, APIs: 8, Instructions: 36windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005550AD Relevance: 10.8, APIs: 7, Instructions: 307COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050EEE8 Relevance: 10.8, APIs: 4, Strings: 2, Instructions: 258keyboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00554E09 Relevance: 10.8, APIs: 7, Instructions: 251COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00560EDE Relevance: 10.7, APIs: 7, Instructions: 242COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052701A Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 216windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B3646 Relevance: 10.7, APIs: 7, Instructions: 188COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00528149 Relevance: 10.7, APIs: 7, Instructions: 174COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005094BC Relevance: 10.7, APIs: 3, Strings: 3, Instructions: 161keyboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053CCF3 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 155windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F87DD Relevance: 10.6, APIs: 7, Instructions: 126COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F0833 Relevance: 10.6, APIs: 7, Instructions: 111COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E90A1 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 110windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F104E Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 90libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00537644 Relevance: 10.6, APIs: 7, Instructions: 90windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005104A5 Relevance: 10.6, APIs: 7, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00522AAD Relevance: 10.6, APIs: 7, Instructions: 80windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E41A4 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 78registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005024CE Relevance: 10.6, APIs: 7, Instructions: 76windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E6F6B Relevance: 10.6, APIs: 7, Instructions: 73COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051EFC0 Relevance: 10.6, APIs: 7, Instructions: 73windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E1054 Relevance: 10.6, APIs: 7, Instructions: 73COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005555BC Relevance: 10.6, APIs: 7, Instructions: 64windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E8336 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 53libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D9260 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 53libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D91F4 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 45libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E51B7 Relevance: 10.5, APIs: 7, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00552EF1 Relevance: 9.5, APIs: 6, Instructions: 481COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050EC57 Relevance: 9.2, APIs: 6, Instructions: 221COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053F272 Relevance: 9.1, APIs: 6, Instructions: 139COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053D73B Relevance: 9.1, APIs: 6, Instructions: 139COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005587C4 Relevance: 9.1, APIs: 6, Instructions: 120windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00540397 Relevance: 9.1, APIs: 6, Instructions: 109windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051CCD8 Relevance: 9.1, APIs: 6, Instructions: 95windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00542D0B Relevance: 9.1, APIs: 6, Instructions: 82windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00532C5F Relevance: 9.1, APIs: 6, Instructions: 76windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E4CAE Relevance: 9.1, APIs: 6, Instructions: 69COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005166C7 Relevance: 9.1, APIs: 6, Instructions: 65COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00555723 Relevance: 9.1, APIs: 6, Instructions: 64windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E0FBC Relevance: 9.1, APIs: 6, Instructions: 56COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E1116 Relevance: 9.1, APIs: 6, Instructions: 52windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005096FE Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 197windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E465E Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 121registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B2B0B Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 110stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DC886 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 94windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00508E9E Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 73keyboardCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055CC1F Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 71windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00514652 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 56libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F0FC6 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 54libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004ECFA9 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 46libraryfileloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E18F6 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 38libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00528CA1 Relevance: 7.8, APIs: 5, Instructions: 346windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F8C75 Relevance: 7.8, APIs: 5, Instructions: 338COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051F5DC Relevance: 7.7, APIs: 5, Instructions: 182COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B150B Relevance: 7.7, APIs: 5, Instructions: 154COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005232D4 Relevance: 7.7, APIs: 5, Instructions: 153windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00550E4D Relevance: 7.6, APIs: 5, Instructions: 135COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00511276 Relevance: 7.6, APIs: 5, Instructions: 129windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051EDDF Relevance: 7.6, APIs: 5, Instructions: 123COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053C7C9 Relevance: 7.6, APIs: 5, Instructions: 105COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00536EB2 Relevance: 7.6, APIs: 5, Instructions: 102windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F92C2 Relevance: 7.6, APIs: 5, Instructions: 99COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00500B14 Relevance: 7.6, APIs: 5, Instructions: 97COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051E0B7 Relevance: 7.6, APIs: 5, Instructions: 96COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DE4FC Relevance: 7.6, APIs: 5, Instructions: 92windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050C566 Relevance: 7.6, APIs: 5, Instructions: 91windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005404E3 Relevance: 7.6, APIs: 5, Instructions: 89COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005229B7 Relevance: 7.6, APIs: 5, Instructions: 87COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E8693 Relevance: 7.6, APIs: 5, Instructions: 81windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EA6E4 Relevance: 7.6, APIs: 5, Instructions: 80windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D2A40 Relevance: 7.6, APIs: 5, Instructions: 76COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00516D91 Relevance: 7.6, APIs: 5, Instructions: 70windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052144F Relevance: 7.6, APIs: 5, Instructions: 70windowCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00502EA5 Relevance: 7.6, APIs: 5, Instructions: 66COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051759B Relevance: 7.6, APIs: 5, Instructions: 66windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B4C7F Relevance: 7.6, APIs: 5, Instructions: 61COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D7180 Relevance: 7.6, APIs: 5, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FF3CD Relevance: 7.6, APIs: 5, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E0D9F Relevance: 7.6, APIs: 5, Instructions: 55stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055C168 Relevance: 7.6, APIs: 5, Instructions: 53threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00516BF7 Relevance: 7.5, APIs: 5, Instructions: 48windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052C58F Relevance: 7.5, APIs: 5, Instructions: 45windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051F55B Relevance: 7.5, APIs: 5, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005772A2 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 239COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052831B Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 211windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050B6D4 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 100windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DCE2F Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 72windowCOMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EF457 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 72libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00513324 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 55windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EACB0 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 43libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052F478 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 40timewindowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E183D Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 39libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E17E4 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 35libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005149B6 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 31libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005286AD Relevance: 6.5, APIs: 4, Instructions: 476COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055389A Relevance: 6.4, APIs: 4, Instructions: 435COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050AB35 Relevance: 6.2, APIs: 4, Instructions: 208COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054EC04 Relevance: 6.2, APIs: 4, Instructions: 187windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00531548 Relevance: 6.2, APIs: 4, Instructions: 177COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005320C2 Relevance: 6.2, APIs: 4, Instructions: 173COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051C23C Relevance: 6.2, APIs: 4, Instructions: 162windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00551406 Relevance: 6.2, APIs: 4, Instructions: 159COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0058539D Relevance: 6.2, APIs: 4, Instructions: 157COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00514BBE Relevance: 6.2, APIs: 4, Instructions: 155timeCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005AF7AE Relevance: 6.2, APIs: 4, Instructions: 155windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054F07D Relevance: 6.2, APIs: 4, Instructions: 151windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EC592 Relevance: 6.1, APIs: 4, Instructions: 132windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005CD627 Relevance: 6.1, APIs: 4, Instructions: 130COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005247B7 Relevance: 6.1, APIs: 4, Instructions: 129COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005528C2 Relevance: 6.1, APIs: 4, Instructions: 129COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051C592 Relevance: 6.1, APIs: 4, Instructions: 120COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005522AE Relevance: 6.1, APIs: 4, Instructions: 114COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F2596 Relevance: 6.1, APIs: 4, Instructions: 111COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00536799 Relevance: 6.1, APIs: 4, Instructions: 101COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005187A3 Relevance: 6.1, APIs: 4, Instructions: 95COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052B4C0 Relevance: 6.1, APIs: 4, Instructions: 93COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00585637 Relevance: 6.1, APIs: 4, Instructions: 92COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A64BC Relevance: 6.1, APIs: 4, Instructions: 91windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00534FA2 Relevance: 6.1, APIs: 4, Instructions: 87COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054CF23 Relevance: 6.1, APIs: 4, Instructions: 83COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055F53F Relevance: 6.1, APIs: 4, Instructions: 66windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DA4FD Relevance: 6.1, APIs: 4, Instructions: 62windowCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EF750 Relevance: 6.1, APIs: 4, Instructions: 61windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053F189 Relevance: 6.1, APIs: 4, Instructions: 59COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005155F7 Relevance: 6.1, APIs: 4, Instructions: 59windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050A321 Relevance: 6.1, APIs: 4, Instructions: 57COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053A41D Relevance: 6.1, APIs: 4, Instructions: 57COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DC709 Relevance: 6.1, APIs: 4, Instructions: 54windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00517457 Relevance: 6.1, APIs: 4, Instructions: 52fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055C43E Relevance: 6.1, APIs: 4, Instructions: 51COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EA569 Relevance: 6.0, APIs: 4, Instructions: 50COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00508C99 Relevance: 6.0, APIs: 4, Instructions: 50COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051B1DA Relevance: 6.0, APIs: 4, Instructions: 50windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E965A Relevance: 6.0, APIs: 4, Instructions: 49COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051B846 Relevance: 6.0, APIs: 4, Instructions: 48COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F8758 Relevance: 6.0, APIs: 4, Instructions: 47COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B38FB Relevance: 6.0, APIs: 4, Instructions: 47COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004ECA92 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004ECE25 Relevance: 6.0, APIs: 4, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053F635 Relevance: 6.0, APIs: 4, Instructions: 38COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054EB85 Relevance: 6.0, APIs: 4, Instructions: 28COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055CCE3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 62windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050C8A6 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 59windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EE769 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 48libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005D636A Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 45COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A36E1 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|